Patch
CVE-2021-40444
with vRx
Vulnerability Overview
CVE Name
CVE-2021-40444
Severity
8.8
High
CVE Description
<p>Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents.</p> <p>An...</p>
Show more
Show less
Latest Patch info
Patch Name
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40444
Date
15.09.2021
Script

Script Type
Remediation script
Introduction
As cyber threats evolve, taking swift and effective action is critical to safeguarding your systems. In response to threats like MerkSpy, which exploits vulnerabilities such as CVE-2021-40444, a well-crafted remedy script can help you address potential issues and reinforce your defenses. Today, we present a Python script designed to remove suspicious files, update security settings, and notify users of potential threats.
Understanding CVE-2021-40444 and MerkSpy
CVE-2021-40444 is a high-severity vulnerability in Microsoft’s MSHTML component. It allows attackers to execute arbitrary code on a victim’s system via malicious Microsoft Word documents. Exploiting this flaw can lead to severe consequences, including the installation of spyware like MerkSpy.
MerkSpy is known for its capabilities to:
Monitor User Activities: Steal sensitive information through keystroke logging and screenshots.
Establish Persistence: Modify system settings to ensure it remain active.
Exfiltrate Data: Send stolen information to remote servers.
The Remedy Script
This Python script performs the following key actions to counteract threats like MerkSpy:
Remove Suspicious Files:
Scans for and delete known malicious files, such as GoogleUpdate.exe, which may indicate malware presence.
Update Security Settings:
Enable Windows Defender Real-Time Monitoring: Uses PowerShell commands to ensure real-time protection is active.
Repair Windows Defender: If initial settings updates fail, the script attempts a quick scan to repair and refresh Windows Defender’s status.
Notify the User:
Provides a simple notification mechanism to inform users about potential threats and actions taken.
Usage Instructions
Save the Script: Save the provided Python code as remedy.py or another preferred name.
Run the Script: Execute the script using Python from your command line:
python remedy.py
Review the Output: Check the console output to ensure suspicious files have been removed, security settings updated, and that any issues with Windows Defender are addressed.
Conclusion
Implementing this remedy script is a proactive step in defending against sophisticated threats like MerkSpy. By removing malicious files, updating security settings, and notifying users, you enhance your system’s resilience against cyber attacks.
Read more
Read less
Affected OS & Apps
Windows 10 1607
by
Microsoft
Windows 10 1507
by
Microsoft
Windows 10 1809
by
Microsoft
Show more
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Trusted by 600+ customers:




Solution
Patch faster and better with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.